Security Requirements
Secure communication channels to avoid eavesdropping.
Authentication protocols for mutually suspicious clients and servers.
- Servers must be satisfied that clients are who they claim to be.
- Clients must be satisfied that they get the service from authentic servers.
Ensure that communication is fresh.